Litigation, Compliance and Regulatory Law

Blog

Blog

Ten Considerations for a Cybersecurity Incident Response Plan

Here is a link to an article I co-wrote with colleagues at McCarthy Tétrault. The risk remains high.  Given the strength of current security technology the largest vulnerability continues to be internal staff vulnerability to phishing and variants such as spearphishing.

Train your staff on the importance of only accessing trusted links to external sources, and techniques for identifying suspicious links.  Then test them with mock phishing attacks to assess and revisit your training if required!

If you need an update to your cybersecurity policies or training, give us a call to see how we can help.

 

Comments
Login to post comments.